DEV Community

# infosec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
A Deep Dive into the GetProcessHandleFromHwnd API

A Deep Dive into the GetProcessHandleFromHwnd API

1
Comments
1 min read
North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS

North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS

Comments
3 min read
FullAgenticStack WhatsApp-first: RFC-WF-0004

FullAgenticStack WhatsApp-first: RFC-WF-0004

Comments
6 min read
FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

1
Comments
7 min read
How to Detect VMware Exploitation Attempts in Your Logs Before They Become Incidents

How to Detect VMware Exploitation Attempts in Your Logs Before They Become Incidents

1
Comments
5 min read
I Called It: How I Predicted the GhostLoader Breach Before The Hacker News

I Called It: How I Predicted the GhostLoader Breach Before The Hacker News

1
Comments
3 min read
Yet Another CVE analysis (CVE-2019-14287)

Yet Another CVE analysis (CVE-2019-14287)

Comments
2 min read
How Data Brokers Hide Removal Forms (And How to Remove Yourself Automatically)

How Data Brokers Hide Removal Forms (And How to Remove Yourself Automatically)

Comments
6 min read
Why Attestation Middleware Exists

Why Attestation Middleware Exists

Comments
5 min read
The SOC2 Controls That Actually Require Decision Logs (And Why No One Logs Them)

The SOC2 Controls That Actually Require Decision Logs (And Why No One Logs Them)

2
Comments
4 min read
The Descent Through the Trust Stack

The Descent Through the Trust Stack

2
Comments
5 min read
When Your Mouse Becomes a Microphone

When Your Mouse Becomes a Microphone

1
Comments
1 min read
Buffer Overflows on x64 Windows: A Practical Beginners Guide (Part 1): Setting up

Buffer Overflows on x64 Windows: A Practical Beginners Guide (Part 1): Setting up

2
Comments
5 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments 1
1 min read
OpenSSL Engine API Explained: Connecting Google Cloud KMS, YubiKey, and More

OpenSSL Engine API Explained: Connecting Google Cloud KMS, YubiKey, and More

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.